SlideShare a Scribd company logo
1 of 37
Miriam Schulman
If you happen to be reading this article online from your
computer at work, your boss may be reading over your
shoulder-electronically. New technologies allow employers to
check whether employees are wasting time at recreational Web
sites or sending unprofessional e-mails. But when do an
employer's legitimate business interests become an unacceptable
invasion of worker privacy?
Last year, a software package came on the market that allows
employers to monitor their workers' Internet use. It employs a
database of 45,000 Web sites that are categorized as
"productive," "unproductive," or "neutral," and rates employees
based on their browsing. It identifies the most frequent users
and the most popular sites. It's called LittleBrother.
Though the title is tongue-in-cheek, LittleBrother does
represent the tremendous capabilities technology has provided
for employers to keep track of what their work force is up to.
There are also programs to search e-mails and programs to
block objectionable Web sites. Beyond installing monitoring
software, your boss can simply go into your hard drive, check
your cache to see where you've been on the Net, and read your
e-mail.
Did you delete that message you sent about his incompetence?
Not good enough. The e-mail trash bin probably still exists on
the server, and there are plenty of computer consultants who can
retrieve the incriminating message.
All told, such monitoring is a widespread-and-growing-
phenomenon. Looking just at e-mail, a 1996 survey by the
Society for Human Resource Management found that 36 percent
of responding companies searched employee messages regularly
and 70 percent said employers should reserve the right to do so.
The Law
Legally, employees have little recourse. The most relevant
federal law, the 1986 Electronic Communications Privacy Act,
prohibits unauthorized interception of various electronic
communications, including e-mail. However, the law exempts
service providers from its provisions, which is commonly
interpreted to include employers who provide e-mail and Net
access, according to David Sobel, legal counsel for the
Electronic Privacy Information Center in Washington, D.C. A
federal bill that would have required employers at least to
notify workers that they were being monitored failed to come to
a vote from 1993 to 1995.
The situation in the courts is similar. "There aren't many cases,
and they tend to go against the employee," according to Santa
Clara University Professor of Law Dorothy Glancy. "Often,
court opinions take the point of view that when the employees
are using employers' property—the employers' computers and
networks—the employees' expectation of privacy is minimal."
When courts take this view, Glancy continues, "if employees
want to have private communications, they can enjoy them on
their own time and equipment."
In a presentation on employee monitoring, Mark S. Dichter and
Michael S. Burkhardt of the law firm Morgan, Lewis & Bockius
explain that courts have tried to balance "an employee's
reasonable expectation of privacy against the employer's
business justification for monitoring."
For example, in Smyth v. Pillsbury Co., Michael Smyth argued
that his privacy was violated and he was wrongfully discharged
from his job after his employers read several e-mails he had
exchanged with his supervisor. In the electronic messages,
among other offensive references, he threatened to "kill the
backstabbing bastards" in sales management.
The court ruled that Smyth had "no reasonable expectation of
privacy" on his employer's system, despite the fact that
Pillsbury had repeatedly assured employees that their e-mail
was confidential. In addition, the court held that the company's
interest in preventing "inappropriate and unprofessional"
conduct outweighed Smyth's privacy rights.
Privacy as a Moral Matter
But the fact that employee monitoring is legal does not
automatically make it right. From an ethical point of view, an
employee surely does not give up all of his or her privacy when
entering the workplace. To determine how far employee and
employer moral rights should extend, it's useful to start with a
brief exploration of how privacy becomes a moral matter.
Michael J. Meyer, SCU professor of philosophy, explains it this
way: "Employees are autonomous moral agents. Among other
things, that means they have independent moral status defined
by some set of rights, not the least of which is the right not to
be used by others only as a means to increase overall welfare or
profits."
Applying this to the workplace, Meyer says, "As thinking
actors, human beings are more than cogs in an organization—
things to be pushed around so as to maximize profits. They are
entitled to respect, which requires some attention to privacy. If
a boss were to monitor every conversation or move, most of us
would think of such an environment as more like a prison than a
humane workplace." But, like all rights, privacy is not absolute.
Sometimes, as in the case of law enforcement, invasions of
privacy may be warranted. In "Privacy, Morality, and the Law,"
William Parent, also a philosophy professor at SCU, sets out six
criteria for determining whether an invasion of privacy is
justifiable:
1. For what purpose is the undocumented personal knowledge
sought?
2. Is this purpose a legitimate and important one?
3. Is the knowledge sought through invasion of privacy relevant
to its justifying purpose?
4. Is invasion of privacy the only or the least offensive means
of obtaining the knowledge?
5. What restrictions or procedural restraints have been placed
on the privacy-invading techniques?
6. How will the personal knowledge be protected once it has
been acquired?
These questions can offer guidance as we consider both sides of
the controversy.
The Case for Workplace Monitoring
If an employer uses a software package that sweeps through
office computers and eliminates games workers have installed,
few people will feel such an action is an invasion of privacy.
Our comfort with this kind of intrusion suggests that most of us
don't fault an employer who insists that the equipment he or she
provides be used for work, at least during working hours.
Why, then, should we balk when an employer tries to ensure
that his equipment is not being used to surf non-job-related Web
sites? Hours spent online browsing the recipe files of
Epicurious are no less a breach of the work contract than games
playing.
"The underlying principle is value for money," says Joseph R.
Garber, a columnist for Forbes magazine. "If you don't deliver
value for money, in some sense, you're lying."
Garber gives this illustration: If we hired someone to paint our
house, and they didn't do the northern wall, we would feel moral
outrage. Similarly, if we pay workers to give a good day's work
and they are, instead, surfing X-rated Web sites, we are also
morally outraged.
Such "cyberlollygagging" is no small problem. A study by
Nielsen Media Research found that employees at major
corporations such as IBM, Apple, and AT&T logged onto the
online edition of Penthouse thousands of times a month.
Beyond worry about lost productivity, employers have
legitimate concerns about the use of e-mail in thefts of
proprietary information, which, according to the "Handbook on
White Collar Crime," account for more than $2 billion in losses
a year. The transfer of such information can be monitored by
programs that search employee e-mails for suspect word strings
or by employers simply going into the employee's hard drive
and reading the messages.
In a case last year, a former employee of Cadence Systems was
charged with stealing proprietary information and intending to
bring it to the rival software maker Avant! According to
prosecutors, before leaving Cadence, he e-mailed a file
containing 5 million bytes to a personal e-mail account. Such
large messages suggested that he might be sending source code
for the company's products and prompted Cadence to contact the
police.
Electronic communications can pose other dangers for
employers besides breached security and lost productivity. More
and more, employers are being held legally liable for the
atmosphere in the workplace. Although the case was ultimately
dismissed, employers worry about litigation like the $70-million
suit brought by Morgan Stanley employees, who claimed that
racist jokes on the company's electronic mail system created a
hostile work environment.
Sexual harassment cases also often hinge on allegations of a
hostile work environment, which might be evidenced by
employees downloading or displaying pornographic material
from the Web or sending off-color e-mails. "The days of guys
putting naked bunnies up on their computer screens are gone
because that's actionable stuff," Garber comments.
To prevent such abuses, Garber argues, employers need to be
allowed to monitor: "We can't make corporations responsible
for stopping unacceptable forms of behavior and then deny them
the tools needed to keep an eye out for that behavior."
The Case Against Workplace Monitoring
Consider this scenario: It's lunch hour. An employee writes a
note to her boyfriend. She puts it in an envelope, affixes her
own stamp, and drops it in the basket where outgoing mail is
collected. Does the fact that the pencil and paper she used
belong to her employer give her boss the right to open and read
this letter?
Although most people would answer no, that's just the argument
employers are making to defend monitoring e-mail, according to
the Electronic Privacy Information Center's Sobel: Employers
claim that because they own the computer, they have the right
to read the e-mail it produces. The situation is complicated by
the fact that work and personal life are not as clearly delineated
as they once were, due, in part, to the very technologies that are
being monitored. Employees may telecommute, doing much of
their business through e-mail and the Net. Often, they work a
good deal more than 40 hours a week. If they take a moment to
send a message to Aunt Margaret in Saskatoon, do they not have
a right to expect their e-mail will be confidential?
"Most people don't work 8 to 5," says Anthony Pozos, senior
vice president for human resources and corporate services at
Amdahl Corp. "We pay people to do a job; we don't really pay
by time increment. Employees probably do use our e-mail or
Web access for personal matters; it's analogous to using the
telephone. People do sometimes need to do personal things on
the job, but as long as it doesn't interfere with work, that should
be okay."
Another ethical consideration in the debate is fairness. Usually,
it's not corporate higher-ups who are subject to monitoring, but
line workers. That's particularly true when it comes to key-
stroke monitoring, a form of electronic surveillance that
measures the speed of data entry. According to an article in
Public Personnel Management, "The majority of employees
being electronically monitored are women in low-paying
clerical positions."
Then there's Parent's question about whether the invasion of
privacy (represented by monitoring) is the only or the least
offensive means of obtaining the information employers seek. In
a survey conducted by PC World, slightly more than half of the
executives interviewed were opposed to monitoring employees'
Internet use. Scott Paddock, manager of PC Brokers, told the
magazine, "First, I trust my employees; that's why they work for
me. If there were to be any problems with an employee, those
problems would present themselves without the need for me to
get involved in cloak-and-dagger shenanigans. And second, if I
spent time monitoring their Web usage, I would be just as guilty
of wasting time as my behavior implies they are."
Trust is often mentioned by opponents of monitoring as a major
ethical issue. As Rita C. Manning writes in the Journal of
Business Ethics, "When we look at the workplaces in which
surveillance is common, we see communities in trouble. What is
missing in these communiti es is trust."
If, Manning continues, employers create trust, employee
behavior "will conform to certain norms, not as a result of being
watched, but as a result of the care and respect which are part of
the communal fabric."
Some Possibilities for Common Ground
It is possible to moot many of these ethical issues by arguing
that monitoring all comes down to a question of contract. That
is the view of David Friedman, an economist and professor at
SCU's School of Law.
"There isn't an agreement that is morally right for everybody.
The important thing is what the parties agree to," he says. "If
the employer gives a promise of privacy, then that should be
respected." If, on the other hand, the employer reserves the
right to read e-mail or monitor Web browsing, the worker can
either accept those terms or look elsewhere for employment,
Friedman continues.
Friedman's argument doesn't address the problems of lower -
income workers who may not have a choice about whether to
accept a job or, if they do, may be choosing between entry-level
positions where monitoring is a feature of the work
environment.
But he does point to an area where some common ground may
exist between opponents and proponents of monitoring. Most
parties to the debate agree that companies should have clear
policies on electronic surveillance and that these should be
effectively communicated to employees.
A recent study by International Data Corp. suggests that such
clarity does not currently prevail. A survey of employees at 110
businesses showed that 45 percent thought their company had
no policy on e-mail at all. Most of those who did know the
company policy had either learned it by word of mouth or were
directly involved in writing it.
Spelling out company policy "is our bottom line," says Sobel.
"We would like to see an outright prohibition on e-mail
monitoring in the workplace, but, at the very least, there needs
to be notice to employees if that's the policy."
Pozos believes that involving employees in the creation of a
monitoring policy is also a way to find common ground. By
bringing employees and managers together to develop principles
and guidelines for electronic mail, Amdahl was able to create a
policy that was acceptable to both sides, Pozos says.
In any case, employers who reserve the right to monitor should
attend to the considerations Parent proposes, ensuring at least
that the monitoring serves a legitimate purpose and follows
clear procedures to protect a worker's personal life from
unnecessary prying, either by LittleBrother or by Big Brother.
Further Reading
Dichter, Mark S., and Burkhardt, Michael S. "Electronic
Interaction in the Workplace: Monitoring, Retrieving and
Storing Employee Communications in the Internet Age."
Garber, Joseph. "The Right to Goof Off." Forbes (Oct. 20,
1997) p. 297.
Greenlaw, Paul S., and Prudeanu, Cornelia. "The Impact of
Federal Legislation to Limit Electronic Monitoring." Public
Personnel Management 26, 2 (June 22, 1997) p. 227.
Manning, Rita C. "Liberal and Communitarian Defenses of
Workplace Privacy." Journal of Business Ethics 6, 8 (June
1997) p. 817.
Parent, W.A. "Privacy, Morality, and the Law." Philosophy &
Public Affairs 12, 4 (Fall 1983) p. 269.
GCU College of Education
LESSON PLAN TEMPLATE
Section 1: Lesson Preparation
Teacher Candidate Name:
Grade Level:
Date:
Unit/Subject:
Instructional Plan Title:
Lesson Summary and Focus:
In 2-3 sentences, summarize the lesson, identifying the central
focus based on the content and skills you are teaching.
Classroom and Student Factors/Grouping:
Describe the important classroom factors (demographics and
environment) and student factors (IEPs, 504s, ELLs, students
with behavior concerns, gifted learners), and the effect of those
factors on planning, teaching, and assessing students to
facilitate learning for all students. This should be limited to 2-3
sentences and the information should inform the differentiation
components of the lesson.
National/State Learning Standards:
Review national and state standards to become familiar with the
standards you will be working with in the classroom
environment.
Your goal in this section is to identify the standards that are the
focus of the lesson being presented. Standards must address
learning initiatives from one or more content areas, as well as
align with the lesson’s learning targets/objectives and
assessments.
Include the standards with the performance indicators and the
standard language in its entirety.
Specific Learning Target(s)/Objectives:
Learning objectives are designed to identify what the teacher
intends to measure in learning. These must be aligned with the
standards. When creating objectives, a learner must consider the
following:
· Who is the audience
· What action verb will be measured during
instruction/assessment
· What tools or conditions are being used to meet the learning
What is being assessed in the lesson must align directly to the
objective created. This should not be a summary of the lesson,
but a measurable statement demonstrating what the student will
be assessed on at the completion of the lesson. For instance,
“understand” is not measureable, but “describe” and “identify”
are.
For example:
Given an unlabeled map outlining the 50 states, students will
accurately label all state names.
Academic Language
In this section, include a bulleted list of the general academic
vocabulary and content-specific vocabulary you need to teach.
In a few sentences, describe how you will teach students those
terms in the lesson.
Resources, Materials, Equipment, and Technology:
List all resources, materials, equipment, and technology you and
the students will use during the lesson. As required by your
instructor, add or attach copies of ALL printed and online
materials at the end of this template. Include links needed for
online resources.
Section 2: Instructional Planning
Anticipatory Set
Your goal in this section is to open the lesson by activating
students’ prior knowledge, linking previous learning with what
they will be learning in this lesson and gaining student interest
for the lesson. Consider various learning preferences
(movement, music, visuals) as a tool to engage interest and
motivate learners for the lesson.
In a bulleted list, describe the materials and activities you will
use to open the lesson. Bold any materials you will need to
prepare for the lesson.
For example:
· I will use a visual of the planet Earth and ask students to
describe what Earth looks like.
· I will record their ideas on the white board and ask more
questions about the amount of water they think is on planet
Earth and where the water is located.
Time Needed
Multiple Means of Representation
Learners perceive and comprehend information differently.
Your goal in this section is to explain how you would present
content in various ways to meet the needs of different learners.
For example, you may present the material using guided notes,
graphic organizers, video or other visual media, annotation
tools, anchor charts, hands-on manipulatives, adaptive
technologies, etc.
In a bulleted list, describe the materials you will use to
differentiate instruction and how you will use these materials
throughout the lesson to support learning. Bold any materials
you will need to prepare for the lesson.
For example:
· I will use a Venn diagram graphic organizer to teach students
how to compare and contrast the two main characters in the
read-aloud story.
· I will model one example on the white board before allowing
students to work on the Venn diagram graphic organizer with
their elbow partner.
Explain how you will differentiate materials for each of the
following groups:
· English language learners (ELL):
· Students with special needs:
· Students with gifted abilities:
· Early finishers (those students who finish early and may need
additional resources/support):
Time Needed
Multiple Means of Engagement
Your goal for this section is to outline how you will engage
students in interacting with the content and academic language.
How will students explore, practice, and apply the content? For
example, you may engage students through collaborative group
work, Kagan cooperative learning structures, hands-on
activities, structured discussions, reading and writing activities,
experiments, problem solving, etc.
In a bulleted list, describe the activities you will engage
students in to allow them to explore, practice, and apply the
content and academic language. Bold any activities you will use
in the lesson. Also, include formative questioning strategies and
higher order thinking questions you might pose.
For example:
· I will use a matching card activity where students will need to
find a partner with a card that has an answer that matches their
number sentence.
· I will model one example of solving a number sentence on the
white board before having students search for the matching
card.
· I will then have the partner who has the number sentence
explain to their partner how they got the answer.
Explain how you will differentiate activities for each of the
following groups:
· English language learners (ELL):
· Students with special needs:
· Students with gifted abilities:
· Early finishers (those students who finish early and may need
additional resources/support):
Time Needed
Multiple Means of Expression
Learners differ in the ways they navigate a learning
environment and express what they know. Your goal in this
section is to explain the various ways in which your students
will demonstrate what they have learned. Explain how you will
provide alternative means for response, selection, and
composition to accommodate all learners. Will you tier any of
these products? Will you offer students choices to demonstrate
mastery? This section is essentially differentiated assessment.
In a bulleted list, explain the options you will provide for your
students to express their knowledge about the topic. For
example, students may demonstrate their knowledge in more
summative ways through a short answer or multiple-choice test,
multimedia presentation, video, speech to text, website, w ritten
sentence, paragraph, essay, poster, portfolio, hands-on project,
experiment, reflection, blog post, or skit. Bold the names of any
summative assessments.
Students may also demonstrate their knowledge in ways that are
more formative. For example, students may take part in thumbs
up-thumbs middle-thumbs down, a short essay or drawing, an
entrance slip or exit ticket, mini-whiteboard answers, fist to
five, electronic quiz games, running records, four corners, or
hand raising.Underline the names of any formative assessments.
For example:
Students will complete a one-paragraph reflection on the in-
class simulation they experienced. They will be expected to
write the reflection using complete sentences, proper
capitalization and punctuation, and utilize an example from the
simulation to demonstrate their understanding. Students will
also take part in formative assessments throughout the lesson,
such as thumbs up-thumbs middle-thumbs down and pair-share
discussions, where you will determine if you need to re-teach or
re-direct learning.
Explain how you will differentiate assessments for each of the
following groups:
· English language learners (ELL):
· Students with special needs:
· Students with gifted abilities:
· Early finishers (those students who finish early and may need
additional resources/support):
Time Needed
Extension Activity and/or Homework
Identify and describe any extension activities or homework
tasks as appropriate. Explain how the extension activity or
homework assignment supports the learning targets/objectives.
As required by your instructor, attach any copies of homework
at the end of this template.
Time Needed
© 2021-2022. Grand Canyon University. All Rights Reserved.
Class Profile
Student Name
ELL/
Proficiency Level
Socioeconomic Status
Race/ Ethnicity
Native Language
Gender
IEP/
504
Other
Age
Reading Performance Level/Score*
Math Performance Level/Score*
Arturo
Yes - 4
Low
Mexican
Spanish
Male
No
Glasses
Grade level
One year below grade level/98
At grade level/151
Bertie
Yes - 5
Low
Vietnamese
Vietnamese
Female
No
None
Grade level
One year above grade level/210
At grade level/108
Beryl
No
Mid
White
English
Female
No
None
Grade level
Two years above grade level/268
At grade level/163
Brandie
Yes - 4
Low
Liberian
Liberian English
Female
No
None
Grade level
At grade level/178
One year below grade level/79
Dessie
Yes - 4
Mid
Russian
Russian
Female
No
None
Grade level
At grade level/113
One year below grade level/65
Diana
Yes - 4
Low
Mexican
Spanish
Female
No
None
Grade level
One year below grade level/79
At grade level/198
Donnie
No
Mid
African American
English
Female
Yes
Hearing Aids
Grade level
At grade level/150
At grade level/124
Eduardo
Yes - 5
Low
Puerto Riccan
Spanish
Male
No
Glasses
Grade level
One year below grade level/88
At grade level/101
Emma
No
Mid
White
English
Female
No
None
Grade level
At grade level/124
At grade level/135
Enrique
No
Low
Mexican
English
Male
ADHD
None
One year above grade level
One year below grade level/45
At grade level/163
Fatma
Yes - 5
Low
Mexican
Spanish
Female
No
Glasses
Grade level
One year below grade level/21
One year above grade level/289
Frances
No
Mid
Mexican
English
Female
No
Diabetic
Glasses
Grade level
At grade level/116
At grade level/114
Francesca
Yes - 5
Low
Mexican
Spanish
Female
No
None
Grade level
At grade level/162
At grade level/178
Fredrick
No
Low
White
English
Male
Learning Disabled
None
One year above grade level
Two years below grade level/285
Two years below grade level/15
Ines
Yes - 4
Low
Mexican
Spanish
Female
Learning Disabled
Glasses
Grade level
One year below grade level/50
One year below grade level/55
Jade
No
Mid
African American
English
Female
No
None
Grade level
At grade level/183
One year above grade level/224
Kent
No
High
White
English
Male
ADHD
Glasses
Grade level
At grade level/178
One year above grade level/208
Lolita
Yes – 5
Low
Navajo
Navajo
Female
No
None
Grade level
At grade level/110
At grade level/141
Maria
No
Mid
Mexican
Spanish
Female
No
NOTE: School does not have gifted program
Grade level
At grade level/139
Two years above grade level/296
Mason
Yes - 4
Low
Vietnamese
Vietnamese
Male
Yes
High Func-tioning Autism
Grade level
At grade level/154
At grade level/138
Nick
No
Low
White
English
Male
No
None
Grade level
One year above grade level/205
At grade level/180
Noah
No
Low
African American
English
Male
No
Glasses
Grade level
At grade level/193
At grade level/177
Sharlene
No
Mid
White
English
Female
No
None
Grade level
One year above grade level/110
At grade level/125
Sophia
Yes - 5
Mid
Guatamalan
Spanish
Female
No
None
Grade level
At grade level/129
At grade level/152
Stuart
No
Mid
White
English
Male
No
Allergic to peanuts
Grade level
One year above grade level/231
At grade level/116
Terrence
No
Mid
African American
English
Male
No
None
Grade level
At grade level/189
At grade level/192
Wade
No
Mid
White
English
Male
No
Glasses
Grade level
At grade level/179
One year above grade level/223
Welington
Yes – 3
Low
Cuban
Spanish
Male
Learning Disabled
Glasses
Grade level
One year below grade level/82
Two years below grade level/24
Wendell
Yes - 2
Low
Somalian Refugee
Somali
Male
No
None
Grade level
One year below grade level/51
Two years below grade level/45
Yung
Yes - 4
Low
Burmese
Burmese
Male
No
None
One year below grade level
One year below grade level/98
Two years below grade level/65
*Scaled Scores Key: Above Grade Level = 200 +, At Grade
Level = 100-199, Below Grade Level = 0-99
© 2018. Grand Canyon University. All Rights Reserved.

More Related Content

More from IlonaThornburg83

Omit all general journal entry explanations.Be sure to include c.docx
Omit all general journal entry explanations.Be sure to include c.docxOmit all general journal entry explanations.Be sure to include c.docx
Omit all general journal entry explanations.Be sure to include c.docx
IlonaThornburg83
 
Offer an alternative explanation for how these patterns of criminal .docx
Offer an alternative explanation for how these patterns of criminal .docxOffer an alternative explanation for how these patterns of criminal .docx
Offer an alternative explanation for how these patterns of criminal .docx
IlonaThornburg83
 
Of the five management functions, which do you expect will experienc.docx
Of the five management functions, which do you expect will experienc.docxOf the five management functions, which do you expect will experienc.docx
Of the five management functions, which do you expect will experienc.docx
IlonaThornburg83
 
Obtaining informed consent for services from clients is required of .docx
Obtaining informed consent for services from clients is required of .docxObtaining informed consent for services from clients is required of .docx
Obtaining informed consent for services from clients is required of .docx
IlonaThornburg83
 
ObjectiveTo acquire a comprehensive understanding of the applicatio.docx
ObjectiveTo acquire a comprehensive understanding of the applicatio.docxObjectiveTo acquire a comprehensive understanding of the applicatio.docx
ObjectiveTo acquire a comprehensive understanding of the applicatio.docx
IlonaThornburg83
 

More from IlonaThornburg83 (20)

Once you have identified two questions that interest you, conduct an.docx
Once you have identified two questions that interest you, conduct an.docxOnce you have identified two questions that interest you, conduct an.docx
Once you have identified two questions that interest you, conduct an.docx
 
On December 31, 2015, Ms. Levine CPA, your manager and the treasurer.docx
On December 31, 2015, Ms. Levine CPA, your manager and the treasurer.docxOn December 31, 2015, Ms. Levine CPA, your manager and the treasurer.docx
On December 31, 2015, Ms. Levine CPA, your manager and the treasurer.docx
 
On Dumpster Diving” by Lars Eighner (50 Essays, p. 139-15.docx
On Dumpster Diving” by Lars Eighner (50 Essays, p. 139-15.docxOn Dumpster Diving” by Lars Eighner (50 Essays, p. 139-15.docx
On Dumpster Diving” by Lars Eighner (50 Essays, p. 139-15.docx
 
Ok so I have done all the calculations, graphs and interpritations m.docx
Ok so I have done all the calculations, graphs and interpritations m.docxOk so I have done all the calculations, graphs and interpritations m.docx
Ok so I have done all the calculations, graphs and interpritations m.docx
 
Ok so I know this is extreme short notice but I have a final 6 page .docx
Ok so I know this is extreme short notice but I have a final 6 page .docxOk so I know this is extreme short notice but I have a final 6 page .docx
Ok so I know this is extreme short notice but I have a final 6 page .docx
 
Offenses and Punishment. Please respond to the following Explai.docx
Offenses and Punishment. Please respond to the following Explai.docxOffenses and Punishment. Please respond to the following Explai.docx
Offenses and Punishment. Please respond to the following Explai.docx
 
Omit all general journal entry explanations.Be sure to include c.docx
Omit all general journal entry explanations.Be sure to include c.docxOmit all general journal entry explanations.Be sure to include c.docx
Omit all general journal entry explanations.Be sure to include c.docx
 
Offer an alternative explanation for how these patterns of criminal .docx
Offer an alternative explanation for how these patterns of criminal .docxOffer an alternative explanation for how these patterns of criminal .docx
Offer an alternative explanation for how these patterns of criminal .docx
 
Often, as a business operates, the partners bring some of their pers.docx
Often, as a business operates, the partners bring some of their pers.docxOften, as a business operates, the partners bring some of their pers.docx
Often, as a business operates, the partners bring some of their pers.docx
 
Of all the GNR technologies (genetic engineering, nanotechnology and.docx
Of all the GNR technologies (genetic engineering, nanotechnology and.docxOf all the GNR technologies (genetic engineering, nanotechnology and.docx
Of all the GNR technologies (genetic engineering, nanotechnology and.docx
 
Of the five management functions, which do you expect will experienc.docx
Of the five management functions, which do you expect will experienc.docxOf the five management functions, which do you expect will experienc.docx
Of the five management functions, which do you expect will experienc.docx
 
Of the numerous forms of communication technologies presented in thi.docx
Of the numerous forms of communication technologies presented in thi.docxOf the numerous forms of communication technologies presented in thi.docx
Of the numerous forms of communication technologies presented in thi.docx
 
Oceanic currents are an important mechanism for the transfer of ener.docx
Oceanic currents are an important mechanism for the transfer of ener.docxOceanic currents are an important mechanism for the transfer of ener.docx
Oceanic currents are an important mechanism for the transfer of ener.docx
 
Obtaining informed consent for services from clients is required of .docx
Obtaining informed consent for services from clients is required of .docxObtaining informed consent for services from clients is required of .docx
Obtaining informed consent for services from clients is required of .docx
 
ObjectiveTo acquire a comprehensive understanding of the applicatio.docx
ObjectiveTo acquire a comprehensive understanding of the applicatio.docxObjectiveTo acquire a comprehensive understanding of the applicatio.docx
ObjectiveTo acquire a comprehensive understanding of the applicatio.docx
 
Observe the block diagrams.  Place events in order of occurrence in .docx
Observe the block diagrams.  Place events in order of occurrence in .docxObserve the block diagrams.  Place events in order of occurrence in .docx
Observe the block diagrams.  Place events in order of occurrence in .docx
 
on 1.docx
on 1.docxon 1.docx
on 1.docx
 
On April 8, 2014 Microsoft ended support of its Windows XP operating.docx
On April 8, 2014 Microsoft ended support of its Windows XP operating.docxOn April 8, 2014 Microsoft ended support of its Windows XP operating.docx
On April 8, 2014 Microsoft ended support of its Windows XP operating.docx
 
Objective the students will be able to recognize the various genr.docx
Objective the students will be able to recognize the various genr.docxObjective the students will be able to recognize the various genr.docx
Objective the students will be able to recognize the various genr.docx
 
On a blog site, httpcuriosity.discovery.comquestionsuperhuman.docx
On a blog site, httpcuriosity.discovery.comquestionsuperhuman.docxOn a blog site, httpcuriosity.discovery.comquestionsuperhuman.docx
On a blog site, httpcuriosity.discovery.comquestionsuperhuman.docx
 

Miriam SchulmanIf you happen to be reading this article online fro

  • 1. Miriam Schulman If you happen to be reading this article online from your computer at work, your boss may be reading over your shoulder-electronically. New technologies allow employers to check whether employees are wasting time at recreational Web sites or sending unprofessional e-mails. But when do an employer's legitimate business interests become an unacceptable invasion of worker privacy? Last year, a software package came on the market that allows employers to monitor their workers' Internet use. It employs a database of 45,000 Web sites that are categorized as "productive," "unproductive," or "neutral," and rates employees based on their browsing. It identifies the most frequent users and the most popular sites. It's called LittleBrother. Though the title is tongue-in-cheek, LittleBrother does represent the tremendous capabilities technology has provided for employers to keep track of what their work force is up to. There are also programs to search e-mails and programs to block objectionable Web sites. Beyond installing monitoring software, your boss can simply go into your hard drive, check your cache to see where you've been on the Net, and read your e-mail. Did you delete that message you sent about his incompetence? Not good enough. The e-mail trash bin probably still exists on the server, and there are plenty of computer consultants who can retrieve the incriminating message. All told, such monitoring is a widespread-and-growing- phenomenon. Looking just at e-mail, a 1996 survey by the Society for Human Resource Management found that 36 percent of responding companies searched employee messages regularly and 70 percent said employers should reserve the right to do so. The Law Legally, employees have little recourse. The most relevant federal law, the 1986 Electronic Communications Privacy Act,
  • 2. prohibits unauthorized interception of various electronic communications, including e-mail. However, the law exempts service providers from its provisions, which is commonly interpreted to include employers who provide e-mail and Net access, according to David Sobel, legal counsel for the Electronic Privacy Information Center in Washington, D.C. A federal bill that would have required employers at least to notify workers that they were being monitored failed to come to a vote from 1993 to 1995. The situation in the courts is similar. "There aren't many cases, and they tend to go against the employee," according to Santa Clara University Professor of Law Dorothy Glancy. "Often, court opinions take the point of view that when the employees are using employers' property—the employers' computers and networks—the employees' expectation of privacy is minimal." When courts take this view, Glancy continues, "if employees want to have private communications, they can enjoy them on their own time and equipment." In a presentation on employee monitoring, Mark S. Dichter and Michael S. Burkhardt of the law firm Morgan, Lewis & Bockius explain that courts have tried to balance "an employee's reasonable expectation of privacy against the employer's business justification for monitoring." For example, in Smyth v. Pillsbury Co., Michael Smyth argued that his privacy was violated and he was wrongfully discharged from his job after his employers read several e-mails he had exchanged with his supervisor. In the electronic messages, among other offensive references, he threatened to "kill the backstabbing bastards" in sales management. The court ruled that Smyth had "no reasonable expectation of privacy" on his employer's system, despite the fact that Pillsbury had repeatedly assured employees that their e-mail was confidential. In addition, the court held that the company's interest in preventing "inappropriate and unprofessional" conduct outweighed Smyth's privacy rights.
  • 3. Privacy as a Moral Matter But the fact that employee monitoring is legal does not automatically make it right. From an ethical point of view, an employee surely does not give up all of his or her privacy when entering the workplace. To determine how far employee and employer moral rights should extend, it's useful to start with a brief exploration of how privacy becomes a moral matter. Michael J. Meyer, SCU professor of philosophy, explains it this way: "Employees are autonomous moral agents. Among other things, that means they have independent moral status defined by some set of rights, not the least of which is the right not to be used by others only as a means to increase overall welfare or profits." Applying this to the workplace, Meyer says, "As thinking actors, human beings are more than cogs in an organization— things to be pushed around so as to maximize profits. They are entitled to respect, which requires some attention to privacy. If a boss were to monitor every conversation or move, most of us would think of such an environment as more like a prison than a humane workplace." But, like all rights, privacy is not absolute. Sometimes, as in the case of law enforcement, invasions of privacy may be warranted. In "Privacy, Morality, and the Law," William Parent, also a philosophy professor at SCU, sets out six criteria for determining whether an invasion of privacy is justifiable: 1. For what purpose is the undocumented personal knowledge sought? 2. Is this purpose a legitimate and important one? 3. Is the knowledge sought through invasion of privacy relevant to its justifying purpose? 4. Is invasion of privacy the only or the least offensive means of obtaining the knowledge? 5. What restrictions or procedural restraints have been placed on the privacy-invading techniques? 6. How will the personal knowledge be protected once it has been acquired?
  • 4. These questions can offer guidance as we consider both sides of the controversy. The Case for Workplace Monitoring If an employer uses a software package that sweeps through office computers and eliminates games workers have installed, few people will feel such an action is an invasion of privacy. Our comfort with this kind of intrusion suggests that most of us don't fault an employer who insists that the equipment he or she provides be used for work, at least during working hours. Why, then, should we balk when an employer tries to ensure that his equipment is not being used to surf non-job-related Web sites? Hours spent online browsing the recipe files of Epicurious are no less a breach of the work contract than games playing. "The underlying principle is value for money," says Joseph R. Garber, a columnist for Forbes magazine. "If you don't deliver value for money, in some sense, you're lying." Garber gives this illustration: If we hired someone to paint our house, and they didn't do the northern wall, we would feel moral outrage. Similarly, if we pay workers to give a good day's work and they are, instead, surfing X-rated Web sites, we are also morally outraged. Such "cyberlollygagging" is no small problem. A study by Nielsen Media Research found that employees at major corporations such as IBM, Apple, and AT&T logged onto the online edition of Penthouse thousands of times a month. Beyond worry about lost productivity, employers have legitimate concerns about the use of e-mail in thefts of proprietary information, which, according to the "Handbook on White Collar Crime," account for more than $2 billion in losses a year. The transfer of such information can be monitored by programs that search employee e-mails for suspect word strings or by employers simply going into the employee's hard drive and reading the messages. In a case last year, a former employee of Cadence Systems was
  • 5. charged with stealing proprietary information and intending to bring it to the rival software maker Avant! According to prosecutors, before leaving Cadence, he e-mailed a file containing 5 million bytes to a personal e-mail account. Such large messages suggested that he might be sending source code for the company's products and prompted Cadence to contact the police. Electronic communications can pose other dangers for employers besides breached security and lost productivity. More and more, employers are being held legally liable for the atmosphere in the workplace. Although the case was ultimately dismissed, employers worry about litigation like the $70-million suit brought by Morgan Stanley employees, who claimed that racist jokes on the company's electronic mail system created a hostile work environment. Sexual harassment cases also often hinge on allegations of a hostile work environment, which might be evidenced by employees downloading or displaying pornographic material from the Web or sending off-color e-mails. "The days of guys putting naked bunnies up on their computer screens are gone because that's actionable stuff," Garber comments. To prevent such abuses, Garber argues, employers need to be allowed to monitor: "We can't make corporations responsible for stopping unacceptable forms of behavior and then deny them the tools needed to keep an eye out for that behavior." The Case Against Workplace Monitoring Consider this scenario: It's lunch hour. An employee writes a note to her boyfriend. She puts it in an envelope, affixes her own stamp, and drops it in the basket where outgoing mail is collected. Does the fact that the pencil and paper she used belong to her employer give her boss the right to open and read this letter? Although most people would answer no, that's just the argument employers are making to defend monitoring e-mail, according to the Electronic Privacy Information Center's Sobel: Employers
  • 6. claim that because they own the computer, they have the right to read the e-mail it produces. The situation is complicated by the fact that work and personal life are not as clearly delineated as they once were, due, in part, to the very technologies that are being monitored. Employees may telecommute, doing much of their business through e-mail and the Net. Often, they work a good deal more than 40 hours a week. If they take a moment to send a message to Aunt Margaret in Saskatoon, do they not have a right to expect their e-mail will be confidential? "Most people don't work 8 to 5," says Anthony Pozos, senior vice president for human resources and corporate services at Amdahl Corp. "We pay people to do a job; we don't really pay by time increment. Employees probably do use our e-mail or Web access for personal matters; it's analogous to using the telephone. People do sometimes need to do personal things on the job, but as long as it doesn't interfere with work, that should be okay." Another ethical consideration in the debate is fairness. Usually, it's not corporate higher-ups who are subject to monitoring, but line workers. That's particularly true when it comes to key- stroke monitoring, a form of electronic surveillance that measures the speed of data entry. According to an article in Public Personnel Management, "The majority of employees being electronically monitored are women in low-paying clerical positions." Then there's Parent's question about whether the invasion of privacy (represented by monitoring) is the only or the least offensive means of obtaining the information employers seek. In a survey conducted by PC World, slightly more than half of the executives interviewed were opposed to monitoring employees' Internet use. Scott Paddock, manager of PC Brokers, told the magazine, "First, I trust my employees; that's why they work for me. If there were to be any problems with an employee, those problems would present themselves without the need for me to get involved in cloak-and-dagger shenanigans. And second, if I spent time monitoring their Web usage, I would be just as guilty
  • 7. of wasting time as my behavior implies they are." Trust is often mentioned by opponents of monitoring as a major ethical issue. As Rita C. Manning writes in the Journal of Business Ethics, "When we look at the workplaces in which surveillance is common, we see communities in trouble. What is missing in these communiti es is trust." If, Manning continues, employers create trust, employee behavior "will conform to certain norms, not as a result of being watched, but as a result of the care and respect which are part of the communal fabric." Some Possibilities for Common Ground It is possible to moot many of these ethical issues by arguing that monitoring all comes down to a question of contract. That is the view of David Friedman, an economist and professor at SCU's School of Law. "There isn't an agreement that is morally right for everybody. The important thing is what the parties agree to," he says. "If the employer gives a promise of privacy, then that should be respected." If, on the other hand, the employer reserves the right to read e-mail or monitor Web browsing, the worker can either accept those terms or look elsewhere for employment, Friedman continues. Friedman's argument doesn't address the problems of lower - income workers who may not have a choice about whether to accept a job or, if they do, may be choosing between entry-level positions where monitoring is a feature of the work environment. But he does point to an area where some common ground may exist between opponents and proponents of monitoring. Most parties to the debate agree that companies should have clear policies on electronic surveillance and that these should be effectively communicated to employees. A recent study by International Data Corp. suggests that such clarity does not currently prevail. A survey of employees at 110 businesses showed that 45 percent thought their company had
  • 8. no policy on e-mail at all. Most of those who did know the company policy had either learned it by word of mouth or were directly involved in writing it. Spelling out company policy "is our bottom line," says Sobel. "We would like to see an outright prohibition on e-mail monitoring in the workplace, but, at the very least, there needs to be notice to employees if that's the policy." Pozos believes that involving employees in the creation of a monitoring policy is also a way to find common ground. By bringing employees and managers together to develop principles and guidelines for electronic mail, Amdahl was able to create a policy that was acceptable to both sides, Pozos says. In any case, employers who reserve the right to monitor should attend to the considerations Parent proposes, ensuring at least that the monitoring serves a legitimate purpose and follows clear procedures to protect a worker's personal life from unnecessary prying, either by LittleBrother or by Big Brother. Further Reading Dichter, Mark S., and Burkhardt, Michael S. "Electronic Interaction in the Workplace: Monitoring, Retrieving and Storing Employee Communications in the Internet Age." Garber, Joseph. "The Right to Goof Off." Forbes (Oct. 20, 1997) p. 297. Greenlaw, Paul S., and Prudeanu, Cornelia. "The Impact of Federal Legislation to Limit Electronic Monitoring." Public Personnel Management 26, 2 (June 22, 1997) p. 227. Manning, Rita C. "Liberal and Communitarian Defenses of Workplace Privacy." Journal of Business Ethics 6, 8 (June 1997) p. 817. Parent, W.A. "Privacy, Morality, and the Law." Philosophy & Public Affairs 12, 4 (Fall 1983) p. 269. GCU College of Education
  • 9. LESSON PLAN TEMPLATE Section 1: Lesson Preparation Teacher Candidate Name: Grade Level: Date: Unit/Subject: Instructional Plan Title: Lesson Summary and Focus: In 2-3 sentences, summarize the lesson, identifying the central focus based on the content and skills you are teaching. Classroom and Student Factors/Grouping: Describe the important classroom factors (demographics and environment) and student factors (IEPs, 504s, ELLs, students with behavior concerns, gifted learners), and the effect of those factors on planning, teaching, and assessing students to facilitate learning for all students. This should be limited to 2-3 sentences and the information should inform the differentiation components of the lesson.
  • 10. National/State Learning Standards: Review national and state standards to become familiar with the standards you will be working with in the classroom environment. Your goal in this section is to identify the standards that are the focus of the lesson being presented. Standards must address learning initiatives from one or more content areas, as well as align with the lesson’s learning targets/objectives and assessments. Include the standards with the performance indicators and the standard language in its entirety. Specific Learning Target(s)/Objectives: Learning objectives are designed to identify what the teacher intends to measure in learning. These must be aligned with the standards. When creating objectives, a learner must consider the following: · Who is the audience · What action verb will be measured during instruction/assessment · What tools or conditions are being used to meet the learning What is being assessed in the lesson must align directly to the objective created. This should not be a summary of the lesson, but a measurable statement demonstrating what the student will be assessed on at the completion of the lesson. For instance, “understand” is not measureable, but “describe” and “identify” are. For example: Given an unlabeled map outlining the 50 states, students will accurately label all state names.
  • 11. Academic Language In this section, include a bulleted list of the general academic vocabulary and content-specific vocabulary you need to teach. In a few sentences, describe how you will teach students those terms in the lesson. Resources, Materials, Equipment, and Technology: List all resources, materials, equipment, and technology you and the students will use during the lesson. As required by your instructor, add or attach copies of ALL printed and online materials at the end of this template. Include links needed for online resources. Section 2: Instructional Planning Anticipatory Set Your goal in this section is to open the lesson by activating students’ prior knowledge, linking previous learning with what they will be learning in this lesson and gaining student interest
  • 12. for the lesson. Consider various learning preferences (movement, music, visuals) as a tool to engage interest and motivate learners for the lesson. In a bulleted list, describe the materials and activities you will use to open the lesson. Bold any materials you will need to prepare for the lesson. For example: · I will use a visual of the planet Earth and ask students to describe what Earth looks like. · I will record their ideas on the white board and ask more questions about the amount of water they think is on planet Earth and where the water is located. Time Needed Multiple Means of Representation Learners perceive and comprehend information differently. Your goal in this section is to explain how you would present content in various ways to meet the needs of different learners. For example, you may present the material using guided notes, graphic organizers, video or other visual media, annotation tools, anchor charts, hands-on manipulatives, adaptive technologies, etc. In a bulleted list, describe the materials you will use to differentiate instruction and how you will use these materials throughout the lesson to support learning. Bold any materials you will need to prepare for the lesson. For example: · I will use a Venn diagram graphic organizer to teach students how to compare and contrast the two main characters in the read-aloud story. · I will model one example on the white board before allowing students to work on the Venn diagram graphic organizer with their elbow partner.
  • 13. Explain how you will differentiate materials for each of the following groups: · English language learners (ELL): · Students with special needs: · Students with gifted abilities: · Early finishers (those students who finish early and may need additional resources/support): Time Needed Multiple Means of Engagement Your goal for this section is to outline how you will engage students in interacting with the content and academic language. How will students explore, practice, and apply the content? For
  • 14. example, you may engage students through collaborative group work, Kagan cooperative learning structures, hands-on activities, structured discussions, reading and writing activities, experiments, problem solving, etc. In a bulleted list, describe the activities you will engage students in to allow them to explore, practice, and apply the content and academic language. Bold any activities you will use in the lesson. Also, include formative questioning strategies and higher order thinking questions you might pose. For example: · I will use a matching card activity where students will need to find a partner with a card that has an answer that matches their number sentence. · I will model one example of solving a number sentence on the white board before having students search for the matching card. · I will then have the partner who has the number sentence explain to their partner how they got the answer. Explain how you will differentiate activities for each of the following groups: · English language learners (ELL): · Students with special needs:
  • 15. · Students with gifted abilities: · Early finishers (those students who finish early and may need additional resources/support): Time Needed Multiple Means of Expression Learners differ in the ways they navigate a learning environment and express what they know. Your goal in this section is to explain the various ways in which your students will demonstrate what they have learned. Explain how you will provide alternative means for response, selection, and composition to accommodate all learners. Will you tier any of these products? Will you offer students choices to demonstrate mastery? This section is essentially differentiated assessment. In a bulleted list, explain the options you will provide for your students to express their knowledge about the topic. For example, students may demonstrate their knowledge in more summative ways through a short answer or multiple-choice test, multimedia presentation, video, speech to text, website, w ritten sentence, paragraph, essay, poster, portfolio, hands-on project, experiment, reflection, blog post, or skit. Bold the names of any summative assessments. Students may also demonstrate their knowledge in ways that are more formative. For example, students may take part in thumbs up-thumbs middle-thumbs down, a short essay or drawing, an entrance slip or exit ticket, mini-whiteboard answers, fist to five, electronic quiz games, running records, four corners, or hand raising.Underline the names of any formative assessments. For example:
  • 16. Students will complete a one-paragraph reflection on the in- class simulation they experienced. They will be expected to write the reflection using complete sentences, proper capitalization and punctuation, and utilize an example from the simulation to demonstrate their understanding. Students will also take part in formative assessments throughout the lesson, such as thumbs up-thumbs middle-thumbs down and pair-share discussions, where you will determine if you need to re-teach or re-direct learning. Explain how you will differentiate assessments for each of the following groups: · English language learners (ELL): · Students with special needs: · Students with gifted abilities: · Early finishers (those students who finish early and may need additional resources/support):
  • 17. Time Needed Extension Activity and/or Homework Identify and describe any extension activities or homework tasks as appropriate. Explain how the extension activity or homework assignment supports the learning targets/objectives. As required by your instructor, attach any copies of homework at the end of this template. Time Needed © 2021-2022. Grand Canyon University. All Rights Reserved. Class Profile Student Name ELL/ Proficiency Level Socioeconomic Status Race/ Ethnicity Native Language Gender IEP/
  • 18. 504 Other Age Reading Performance Level/Score* Math Performance Level/Score* Arturo Yes - 4 Low Mexican Spanish Male No Glasses Grade level One year below grade level/98 At grade level/151 Bertie Yes - 5 Low Vietnamese Vietnamese Female
  • 19. No None Grade level One year above grade level/210 At grade level/108 Beryl No Mid White English Female No None Grade level Two years above grade level/268 At grade level/163
  • 20. Brandie Yes - 4 Low Liberian Liberian English Female No None Grade level At grade level/178 One year below grade level/79 Dessie Yes - 4 Mid Russian Russian Female No None Grade level
  • 21. At grade level/113 One year below grade level/65 Diana Yes - 4 Low Mexican Spanish Female No None Grade level One year below grade level/79 At grade level/198
  • 22. Donnie No Mid African American English Female Yes Hearing Aids Grade level At grade level/150 At grade level/124 Eduardo Yes - 5 Low Puerto Riccan Spanish Male No Glasses Grade level One year below grade level/88 At grade level/101
  • 23. Emma No Mid White English Female No None Grade level At grade level/124 At grade level/135 Enrique No Low Mexican English
  • 24. Male ADHD None One year above grade level One year below grade level/45 At grade level/163 Fatma Yes - 5 Low Mexican Spanish Female No Glasses Grade level One year below grade level/21 One year above grade level/289
  • 25. Frances No Mid Mexican English Female No Diabetic Glasses Grade level At grade level/116 At grade level/114 Francesca Yes - 5 Low Mexican Spanish Female No None
  • 26. Grade level At grade level/162 At grade level/178 Fredrick No Low White English Male Learning Disabled None One year above grade level Two years below grade level/285 Two years below grade level/15
  • 27. Ines Yes - 4 Low Mexican Spanish Female Learning Disabled Glasses Grade level One year below grade level/50 One year below grade level/55 Jade No Mid African American English Female No None Grade level At grade level/183 One year above grade level/224
  • 28. Kent No High White English Male ADHD Glasses Grade level At grade level/178 One year above grade level/208 Lolita Yes – 5 Low Navajo
  • 29. Navajo Female No None Grade level At grade level/110 At grade level/141 Maria No Mid Mexican Spanish Female No NOTE: School does not have gifted program Grade level At grade level/139 Two years above grade level/296
  • 30. Mason Yes - 4 Low Vietnamese Vietnamese Male Yes High Func-tioning Autism Grade level At grade level/154 At grade level/138 Nick No Low White English Male No None
  • 31. Grade level One year above grade level/205 At grade level/180 Noah No Low African American English Male No Glasses Grade level At grade level/193 At grade level/177
  • 32. Sharlene No Mid White English Female No None Grade level One year above grade level/110 At grade level/125 Sophia Yes - 5 Mid Guatamalan Spanish Female No None Grade level At grade level/129
  • 33. At grade level/152 Stuart No Mid White English Male No Allergic to peanuts Grade level One year above grade level/231 At grade level/116
  • 34. Terrence No Mid African American English Male No None Grade level At grade level/189 At grade level/192 Wade No Mid White English Male No Glasses Grade level At grade level/179 One year above grade level/223
  • 35. Welington Yes – 3 Low Cuban Spanish Male Learning Disabled Glasses Grade level One year below grade level/82 Two years below grade level/24 Wendell
  • 36. Yes - 2 Low Somalian Refugee Somali Male No None Grade level One year below grade level/51 Two years below grade level/45 Yung Yes - 4 Low Burmese Burmese Male No None One year below grade level One year below grade level/98 Two years below grade level/65
  • 37. *Scaled Scores Key: Above Grade Level = 200 +, At Grade Level = 100-199, Below Grade Level = 0-99 © 2018. Grand Canyon University. All Rights Reserved.